Unit 7 - Health Info Privacy, Confidentiality, Security, and Ethics Flashcards
It is the right to left alone
Privacy
It is the right to keep personal informations secret
Privacy
T/F: We have the right to not disclose information you don’t want to disclosing
True
The right to control personal information
Privacy
T/F: Freedom from intrusion or invasion into one’s private
affair
True
Confidential emails, Messages monitored by different company
These are examples of what?
Privacy
sharing or disseminating data only to those with a “need to know”
Confidentiality
T/F: It is acceptable to share information within authorized and involved people that helps in consulting/treating the patient for recovery
True
The status accorded to data or information indicating that it is sensitive for some reason and therefore it needs to be protected
Confidentiality or Privacy
Confidentiality
“I know something about you, but since we are in the professional world I MUST NOT tell this information to other people”
Confidentiality or Privacy
Confidentiality
It is stated in the HIV Law _______, that if you divulge the information to other people without the consent of the bearer of that laboratory result, you can be sanctioned or worse imprisoned/penalized
RA 8504
The means to control access and protect information from accidental or intentional disclosure to unauthorized persons and from alteration, destruction or loss
Security, Confidentiality, Privacy
Security
There is already a certain person/group that has the initiative to know the ways to secure information from unauthorized uses, breached of systems, hacking and such
Security, Confidentiality, Privacy
Security
Mechanisms to ensure the safety of data and systems in which the data reside
Security, Confidentiality, Privacy
Security
It is advisable to log-out immediately after data retrieval to avoid hacking or unauthorized access
Security
What are the 3 that works hand in hand?
Privacy, Confidentiality, Security
The means to control access and protect information from accidental or intentional disclosure to unauthorized persons and from alteration, destruction or loss
a. Privacy
b. Confidentiality
c. Security
d. Data Security
c
Mechanisms to ensure the safety of data and systems in which the data reside
a. Privacy
b. Confidentiality
c. Security
d. Data Security
c
Where it needs to be protected against theft, disclosure, improper use or both, and must be disseminated only to authorized individuals or organizations with a need to know
a. Privacy
b. Confidentiality
c. Security
d. Data Security
b
The means to control access and protect information from accidental or intentional disclosure to unauthorized persons and from alteration, destruction or loss
a. Privacy
b. Confidentiality
c. Security
d. Data Security
c
The result of effective protection measures;
a. Privacy
b. Confidentiality
c. Security
d. Data Security
d
The sum of measures that safeguard data and computer programs from undesired occurrences and exposure
a. Privacy
b. Confidentiality
c. Security
d. Data Security
d
Exposure to accidental or intentional disclosure to unauthorized persons
a. Privacy
b. Confidentiality
c. Security
d. Data Security
d
Exposure to accidental or malicious alteration
a. Privacy
b. Confidentiality
c. Security
d. Data Security
d
Exposure to unauthorized copying
a. Privacy
b. Confidentiality
c. Security
d. Data Security
Data Security
Exposure to loss by theft or destruction by hardware failures, software deficiencies, operating mistakes, or physical damage by fire, water, smoke, excessive temperature, electrical failure or sabotage or combination thereof
a. Privacy
b. Confidentiality
c. Security
d. Data Security
D
CHALLENGES FROM PROLIFERATION OF TECHNOLOGIES & APPLICATION:
T/F: New models of care require more care providers to access data across the patient care continuum
True